Okta SAML
Connect Valohai to your Okta identity provider using SAML 2.0. Users authenticate with their Okta credentials, and team membership updates automatically based on Okta group assignments.
Prerequisites
Okta admin account
ACS URL and Entity ID from Valohai (contact [email protected])
Setup Overview
Create SAML 2.0 app integration in Okta
Configure SAML settings and attribute mappings
Share metadata URL with Valohai
Users log in via Okta
Step 1: Create App Integration
Log in to your Okta admin dashboard
Navigate to Applications → Applications
Click Create App Integration
Select SAML 2.0
Click Next
Step 2: Configure General Settings
App name: Enter a name (e.g., "Valohai ML Platform")
App visibility:
Enable Do not display application icon to users
Enable Do not display application icon in the Okta Mobile app
Valohai doesn't support IdP-initiated login (where users start from Okta). Users must initiate login from the Valohai login page.
Click Next to continue.
Step 3: Configure SAML Settings
Basic Settings
Single sign-on URL: Enter the ACS URL provided by Valohai (e.g., https://app.valohai.com/saml/acs/your-org/)
Audience URI (SP Entity ID): Enter the Entity ID provided by Valohai (e.g., https://app.valohai.com/saml/metadata/your-org/)
Name ID format: Select Persistent
Application username: Select Email (recommended)
Attribute Statements
Map Okta user attributes to SAML attributes Valohai expects:
urn:oid:2.5.4.42
URI
user.firstName
urn:oid:2.5.4.4
URI
user.lastName
urn:oid:1.2.840.113549.1.9.1
URI
user.email
Add attribute mappings:
Click Add Attribute Statement
Enter the name exactly as shown (e.g.,
urn:oid:2.5.4.42)Select URI as the format
Enter the value (e.g.,
user.firstName)Repeat for all three attributes
Optional: Group Attributes
To enable automatic team mapping based on Okta groups, add group attributes:
groups
Unspecified
(leave empty)
Matches regex: .*
This sends all Okta group memberships to Valohai. Contact [email protected] to configure which groups map to which Valohai teams.
Click Next after configuring attributes.
Step 4: Feedback
Select feedback options:
I'm an Okta customer adding an internal app
This is an internal app that we have created
Click Finish to create the app.
Step 5: Share Metadata URL
After creating the app:
In the app's Sign On tab, find the section:
"Identity Provider metadata is available if this application supports dynamic configuration"
Right-click the metadata link
Copy the URL (e.g.,
https://yourcompany.okta.com/app/.../sso/saml/metadata)Email the metadata URL to [email protected]
Valohai will configure your organization using this metadata URL.
Step 6: Assign Users
In Okta, assign users or groups to the Valohai app:
Go to the app's Assignments tab
Click Assign → Assign to People or Assign to Groups
Select users or groups
Click Done
Only assigned users can log into Valohai via Okta.
User Login Flow
After Valohai completes configuration:
Users navigate to app.valohai.com
Click Login with SAML or your organization's SSO button
Authenticate using Okta credentials
First-time users are automatically added to your Valohai organization
Tell users to use the SSO login button, not email/password login. This ensures they use Okta authentication.
Automatic Team Mapping
Configure team mapping to automatically assign users to Valohai teams based on Okta groups:
Example Configuration
Okta setup:
Group: "ML Engineers"
Members: Alice, Bob, CharlieValohai configuration (via support):
Okta group "ML Engineers" → Valohai teams: ml-engineering, productionResult: When Alice logs in via Okta, she's automatically added to "ml-engineering" and "production" teams in Valohai.
Contact [email protected] with your group mappings:
Okta Group Name → Valohai Team Names
-----------------------------------
ML Engineers → ml-engineering, production
Data Scientists → research, experimentation
Platform Team → platform, ops, adminsAdvanced Attribute Mapping
Send additional user attributes for sophisticated team assignment:
Custom attributes:
Department
Job title
Cost center
Project assignments
Configuration:
Add custom attribute statements in Okta SAML settings
Contact [email protected] with attribute mapping requirements
Valohai configures conditional team assignment based on attributes
Example:
If user.department == "Research" → Valohai team: research
If user.department == "Engineering" → Valohai team: engineering
If user.jobTitle contains "Lead" → Valohai team: leadershipTroubleshooting
User Can't Log In
Cause: User not assigned to the Valohai app in Okta.
Fix:
Go to Okta admin dashboard
Open the Valohai app
Go to Assignments tab
Assign the user or their group
User tries logging in again
SAML Response Error
Cause: Attribute mappings incorrect or missing.
Fix:
Verify all three required attributes are configured:
urn:oid:2.5.4.42→user.firstNameurn:oid:2.5.4.4→user.lastNameurn:oid:1.2.840.113549.1.9.1→user.email
Ensure format is set to URI for all three
Save changes and test login again
User Has No Team Access
Cause: Group-based team mapping not configured, or user not in mapped groups.
Fix:
Verify user is in the correct Okta groups
Contact [email protected] to confirm group mappings
User logs out and logs in again to refresh team membership
Metadata URL Changed
Cause: Okta app was regenerated or settings changed.
Fix:
Get new metadata URL from Okta app's Sign On tab
Email updated URL to [email protected]
Wait for Valohai to update configuration
User Accidentally Created Separate Account
Cause: User used email/password login instead of SSO button.
Fix:
User logs in via SAML/SSO (creates correctly-linked account)
Contact [email protected] to merge duplicate accounts
Security Best Practices
Assign by groups, not individuals: Manage access by adding/removing users from Okta groups rather than individual assignments.
Enable MFA in Okta: Require multi-factor authentication for all users accessing Valohai.
Review assignments quarterly: Audit which groups and users can access Valohai.
Rotate metadata regularly: Update SAML metadata if you rotate Okta certificates.
Limit admin access: Only grant Valohai admin privileges in access grants to users who need full organizational control.
Monitor login activity: Use Audit Log to track authentication events.
Migration from Email/Password
If your organization currently uses email/password authentication:
Set up Okta SAML integration (this guide)
Notify users about the change to SSO login
Users log in via SSO — Valohai links existing accounts automatically if emails match
Optional: Contact [email protected] to disable email/password login entirely
Related Topics
Azure AD SSO — Alternative SSO provider
Create Teams — Set up teams for automatic assignment
Invite Users — Manual user management (alternative to SSO)
FAQ — Common SSO questions
Last updated
Was this helpful?
